Here’s a new reason: Internet crooks looking to knock people off the Web have started “Skype resolver” services. These services let anyone input someone’s Skype username and get back their last-known IP address. The idea? The person then plugs the IP address into the accompanying “booter” service, pays a fee, and has their victom DDoS’ed off the Internet.
This comes from Brian Krebs’ sleuthing around in the wake of the Exposed.su drama, where he personally got DDoS’ed and SWATted over an article about a stolen-personal-info site linked to “booter.tw”.
Even if you think you’re DDoS proof, the privacy implications means Skype should be considered a no-go.
Lifehacking. Interested in the “quantum mind,” memory, holography, hypnosis, and the intersection of electromagnetic fields with the human body? Read on…
“In the predator-prey situation, any organism which does not have state-of-the-art biosensors is at risk either of becoming prey to another organism that can hunt without being detected, or, of starving because all its prey senses its presence and escapes. The great equalizer lies in all organisms having biosensors operating at the limits of physics.”
From: Popp, F.A et al, “Electromagnetic Bio-Information,” 2nd ed., Urban & Schwarzenberg, Munich, 1989
A hell of a book. Not quite as jam-packed with secrets as W. Ludwig’s (excellent but not entirely correct*) “Informative Medizin” or “SIT-System Informations Therapie,” but unlike Ludwig’s books, this one’s available in English… and even more scientific.
Reasons to stay in shape? “Coherent oscillations are able to perturb bio-communication systems by only small amounts when the system is under good homeostatic control, but by appreciable amounts when the system is under biological stress.” (p.15)
There’s also a fascinating hypothesis as to the biological basis of memory’s seemingly holographic nature: in essence, that medial septum-generated alpha waves act as the “coherent reference wave” which interferes with sensory signals (that have been processed by the mossy fibers into waves)… the resulting “interference pattern” then being transmitted around the brain to get stored as memories. (p. 38)
Since alpha waves are known to be very dominant during hypnosis (Blick, C. H. “Neuro-Hypnose,” Ullstein, 1983) — and the other, very deep form of hypnosis occurs in delta sleep, when delta waves are even more prominent — that suggests that we can create a more accurate mental model of hypnosis (and delta sleep) by viewing it as a sort of holographic exposure. Combine this with the whole business of biophotonics (the coherent emission and amplification of photons by biological organisms as an enabler of quantum effects) and some of the weirder things that are possible start to seem a little more explicable.
(No wonder the KGB grabbed a Western journalist off the street the moment a Soviet scientist tried to explain the implications of coherent biophotonics to him. Hypnosis / alpha waves as ‘mental holography’ also provides a sort of explanation for vague idea that lack of sleep is freedom from the normal rules of the universe: the extremely coherent state of the brain during delta wave sleep, as well as acting to consolidate long term memory, would very effectively allow the surrounding world and its rules to impress itself on the sleeper.
Conversely, this theory ALSO goes a long way towards explaining the “mirrors as psychological defense” paper I linked to a while back, if on a more abstract level. It’s consistent with the evidence to assume that even the most extreme new “memory hologram” would never fully overwrite traces of the old. Given an appropriate reference sensory input, we should therefore be able to recall older states… which the sight of ones’ physical appearance would provide. If this is indeed true, we now start to get an idea of how objects, rituals, etc could all carry meaning beyond their physical presence.)
As to the subject of electromagnetic fields and biology, “a multiplicity of biological effects connected with electromagnetic fields, clearly and unequivocally substantiated by experimentation, exists over the entire frequency range. [… But] as field intensity increases, the most distinct biological effects often only in particular ranges of intensity. […] Biological systems have sensitivity values of the same order of magnitude as the field intensity values of natural fields, and most of them are higher still.” (p. 63)
* Ludwig is a devotee of Burkhard Heim’s unified theory, which makes predictions that appear to have been
disproven by results from CERN. Nevertheless the correlation between Ludwig’s observations as a physicist and Heim theory’s other predictions suggests Heim theory provides worthwhile insights.
“The fact that Skype betrays its users’ online location information is hardly news. For example, The Wall Street Journal and other news outlets warned last year about research showing that it was possible to coax Skype into revealing the IP addresses of individual Skype users. But I believe most Skype users still have no clue about this basic privacy weakness.
What’s changed is that over the past year, a number of services have emerged to help snoops and ne’er-do-wells exploit this vulnerability to track and harass others online. For example, an online search for “skype resolver” returns dozens of results that point to services (of variable reliability) that allow users to look up the Internet address of any Skype user, just by supplying the target’s Skype account name.[…]
Typically, these Skype resolvers are offered in tandem with “booter” or “stresser” services, online attack tools-for-hire than can be rented to launch denial-of-service attacks (one of these services was used in an attack on this Web site, and on that of Ars Technica last week). The idea being that if you want to knock someone offline but you don’t know their Internet address, you can simply search on Skype to see if they have an account, and then use the resolvers to locate their IP. The resolvers work regardless of any privacy settings the target user may have selected within the Skype program’s configuration panel.
Many of these resolver services offer “blacklisting,” which for a fee will allow users to prevent other users from looking up the IP address attached to a specific Skype account, said Brandon Levene, an independent security researcher.
“It’s basically a protection scheme,” Levene said.
Levene said the Skype resolvers work by using a modified Skype client (5.5 or 5.9) to create a debug log. This client is hosted on a web server.
“A simple script is used to construct a link containing a Skype username, which is passed to the modified client,” Levene said. “This client simply attempts to add the requested username to a contact list and parses the target account’s ‘information card’ (if available). This process writes the IP address of the requested username to the debug log, in plain sight.””